Tuesday, April 26, 2016

Creating a Strong Firewall Security Policy:in checkpoint firewall product

Using the Firewall Rule Base The firewall is the core of a well-defined network security policy. The goal of the Check Point Firewall Rule Base is to create rules that only allow the specified connections.

Managing the Firewall Rule Base Use SmartDashboard to easily create and configure Firewall rules for a strong security policy.
















These are the fields that manage the rules for the Firewall security policy.

No:  Rule number in the Firewall Rule Base. Implied rules do not have a number.
Hits : Number of connections that match this rule.
Name : Name that the system administrator gives this rule.
Source : Network object that starts the connection.
Destination : Network object that completes the connection. 

VPN : Definitions of the allowed or blocked traffic between VPN sites.
Service : Type of network service that is allowed or blocked.
Action:  Firewall action that is done when traffic matches the rule.
Track  :Tracking and logging action that is done when traffic matches the rule.
Install On  :Network objects that will get the rule(s) of the security policy. The Policy Targets option installs the rule(s) on all Security Gateways.
Time : Time period that the Firewall enforces this rule.
Comment : An optional field that lets you summarize the rule.

for more details about checkpoint firewalls configuration download this manual :
 http://downloads.checkpoint.com/dc/download.htm?ID=22913